Sciweavers

2275 search results - page 309 / 455
» A Deployment System for Pervasive Computing
Sort
View
IPPS
2007
IEEE
15 years 10 months ago
Transaction Based Authentication Scheme for Mobile Communication: A Cognitive Agent Based Approach
The vulnerable air interface, device level constraints, and insecure encryption techniques of wireless networks have naturally increased the chance of attacker obtaining users inf...
B. Sathish Babu, Pallapa Venkataram
CCS
2007
ACM
15 years 10 months ago
Denial of service or denial of security?
We consider the effect attackers who disrupt anonymous communications have on the security of traditional high- and low-latency anonymous communication systems, as well as on the...
Nikita Borisov, George Danezis, Prateek Mittal, Pa...
AINA
2006
IEEE
15 years 10 months ago
Effect of Redundancy on Mean Time to Failure of Wireless Sensor Networks
In query-based wireless sensor networks (WSNs), the system must perform data sensing and retrieval and possibly aggregate data as a response at runtime. Since a WSN is often deplo...
Anh Phan Speer, Ing-Ray Chen
ICDCS
2005
IEEE
15 years 10 months ago
Resilient Capacity-Aware Multicast Based on Overlay Networks
The global deployment of IP multicast has been slow due to the difficulties related to heterogeneity, scalability, manageability, and lack of a robust inter-domain multicast rout...
Zhan Zhang, Shigang Chen, Yibei Ling, Randy Chow
IPPS
2005
IEEE
15 years 10 months ago
Message Passing for Linux Clusters with Gigabit Ethernet Mesh Connections
Multiple copper-based commodity Gigabit Ethernet (GigE) interconnects (adapters) on a single host can lead to Linux clusters with mesh/torus connections without using expensive sw...
Jie Chen, William A. Watson III, Robert Edwards, W...